Network security cloud technologies

Authors

  • Sotsialova A.S. Alikhan Bokeikhan University Author

Keywords:

information, technology, cloud, infrastructure, cyber attacks, authentication, authorization.

Abstract

The main purpose of this article is to analyze the current problems of network security in cloud technologies, identify the main threats encountered in the cloud environment and provide effective methods and modern solutions aimed at minimizing them. In addition, the study provides for recommendations adapted to the conditions of Kazakhstan, considering the international experience of security in cloud infrastructure. Currently, the rapid development of Information Technology has led to the widespread use of cloud computing. Cloud technologies optimize the processes of data processing, storage and distribution, providing users with convenient and cost-effective solutions. However, the increasing amount of information and data centralization are making network security issues more urgent. Ensuring the level of security in the cloud infrastructure is the main condition for stable and reliable functioning of Information Systems. Maintaining the confidentiality and integrity of data, preventing cyber attacks, ensuring the reliability of authentication and authorization are key factors for the successful development of cloud technologies. From this point of view, the study of the problems of ensuring network security in cloud technologies is one of the most relevant scientific and practical tasks today.

Downloads

Published

2025-10-10

Issue

Section

Статьи